[CIVN-2025-0273] Multiple Vulnerabilities in Mozilla Products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Mozilla Products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Mozilla Firefox versions prior to 144
Mozilla Firefox ESR versions prior to 115.29
Mozilla Firefox ESR versions prior to 140.4
Mozilla Thunderbird versions prior to 140.4
Mozilla Thunderbird versions prior to 144
Overview
Multiple vulnerabilities have been reported in Mozilla products which could allow an attacker to execute arbitrary code on the targeted system.
Target Audience:
All end-user organizations and individuals using Mozilla Products.
Risk Assessment:
High risk of unauthorized access to sensitive information.
Impact Assessment:
Potential for data theft, sensitive information disclosure and complete compromise of system.
Description
Mozilla Firefox is a free and open-source web browser developed by Mozilla foundation, while Firefox ESR (Extended support Release) is a stable version tailored for organizations that re-quire long-term support with only security and maintenance updates.
Multiple vulnerabilities exist in Mozilla products due to Use-after-free in MediaTrack-GraphImpl::GetInstance(), memory corruption, API by web extensions on Windows; out of bounds reads and writes in a more privileged process using manipulated WebGL textures, Cross-process information leaked due to malicious IPC messages, non-writable Object properties could be modified, An OBJECT tag type attribute overrode browser behavior on web resources without a content-type, Insufficient escaping in the ¿Copy as cURL¿ feature, use-after-free memory corruption, Links in a sandboxed iframe could open an external app on Android, An OBJECT tag type attribute overrode browser behavior on web resources without a content-type, The password edit screen was not hidden in Android card view, Address bar could be spoofed on Android using visibilitychange and Spoofing risk in Android custom tabs.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://www.mozilla.org/en-US/security/advisories/mfsa2025-81/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-82/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-83/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-84/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-85/
References
Mozilla
https://www.mozilla.org/en-US/security/advisories/mfsa2025-81/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-82/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-83/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-84/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-85/
CVE Name
CVE-2025-11708
CVE-2025-11709
CVE-2025-11710
CVE-2025-11711
CVE-2025-11712
CVE-2025-11713
CVE-2025-11714
CVE-2025-11715
CVE-2025-11716
CVE-2025-11717
CVE-2025-11718
CVE-2025-11719
CVE-2025-11720
CVE-2025-11721
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmj3if8ACgkQ3jCgcSdc
ys9fRBAAldiy4mNg6Ab2FU3f0kS/AWBHB/bDQPSjwkpPUgZrIRRQRNLKYgHdnx6T
O3trbEA8O8PsKcA2sHSTN1KQmbyFjVc+c7jsACeT+PEIkNDmkRZBexg/e1ZFVwXk
d0rUkt5ScdTZuPkvJgsikcGThfhDGaKpmV5c07zb8+d1Abxyg2bexOpzWh2Bt2e4
w3kFKpBD/uypFPETBcEiBC2QNFQI0mtMGr0S4tku9fA0t532fIXnjzz/rDN1sWrR
jE+vX/O99saaQeJCf+sIqGV7aAwukoXTC8MWDACQBRCm5hLLA6bCBCImmcyPwgwU
2wgRyV6AZYQyG79Viw3aklGpGY/g/y7cxkYBIra7ppFPpgNEL7D/6Q1ogAVlGoiW
mBk6KNzP9xuZy6JWz/uOPLEE8pHXy5UPaI95XDOm8YWbnPKk2JEhgiKcg5rb0R3i
W4ByETvOzElXq3CZsYHJv68XDPSmZvQZ8Zn1dxxTcAkUEgSpfd5MmUeyIdnvYjWI
OS9nqgvd3YvTooWS8qAG59gjjns1Zi3n47v7aEq4QxOcf2W6UJBylxpTGac1sxPP
NofTGbGjjNHMDV0W5hNQZ0JftWQlvws/TTCEjBCmR9HABIW5rXeJBZ3YH5cIRmPi
sFOPJ1LwQwFwyRC+f8NLlO9nAPyRXUBXOAgwYzfT9JD8Pztjgno=
=jJp3
—–END PGP SIGNATURE—–